Get my own profile
Public access
View all55 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Yanchun ZhangVictoria UniversityVerified email at vu.edu.au
Longbing CaoUniversity of Technology Sydney, AustraliaVerified email at uts.edu.au
Peter DologAssociate Professor of Computer Science, Aalborg University, DenmarkVerified email at cs.aau.dk
Shuiguang DENGProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Jian CaoProfessor of Department of Computer Science and Engineering, Shanghai Jiaotong UniversityVerified email at sjtu.edu.cn
Zhenglu YangNankai University, ProfessorVerified email at nankai.edu.cn
Liang HuUniversity of Technology, SydneyVerified email at student.uts.edu.au
Bin FuUniversity of Technology, SydneyVerified email at student.uts.edu.au
Dongjing WangHangzhou Dianzi UniversityVerified email at hdu.edu.cn
Wu ZhiangProfessor of Nanjing Audit UniversityVerified email at seu.edu.cn
Alfredo CuzzocreaProfessor of Computer Engineering, University of Calabria, ItalyVerified email at si.dimes.unical.it
Xiaofang ZhouHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Xun YiProfessor of Cyber Security, RMIT UniversityVerified email at rmit.edu.au
Li Liu (刘礼)Chongqing UniversityVerified email at cqu.edu.cn
Guandong Xu, PhD
Professor in Data Science, University of Technology Sydney
Verified email at uts.edu.au - Homepage